The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
The broadcast storm problem in a mobile ad hoc network
Wireless Networks - Selected Papers from Mobicom'99
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Probabilistic routing in intermittently connected networks
ACM SIGMOBILE Mobile Computing and Communications Review
Routing in a delay tolerant network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks
WOWMOM '05 Proceedings of the Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks
Spray and wait: an efficient routing scheme for intermittently connected mobile networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
A community based mobility model for ad hoc network research
REALMAN '06 Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality
Locating mobile nodes with EASE: learning efficient routes from encounter histories alone
IEEE/ACM Transactions on Networking (TON)
Application protocol design considerations for a mobile internet
Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Applicability of identity-based cryptography for disruption-tolerant networking
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking
Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Efficient routing in intermittently connected mobile networks: the multiple-copy case
IEEE/ACM Transactions on Networking (TON)
Optimistic fair exchange for secure forwarding
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
Multihop Ad Hoc Networking: The Theory
IEEE Communications Magazine
Multihop Ad Hoc Networking: The Reality
IEEE Communications Magazine
ContentPlace: social-aware data dissemination in opportunistic networks
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
RADON: reputation-assisted data forwarding in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Social-Greedy: a socially-based greedy routing algorithm for delay tolerant networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Design and analysis of context-aware forwarding protocols for opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Privacy-enhanced opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Context- and social-aware middleware for opportunistic networks
Journal of Network and Computer Applications
From opportunistic networks to opportunistic computing
IEEE Communications Magazine
Self-adaptive and time-constrained data distribution paths for emergency response scenarios
Proceedings of the 8th ACM international workshop on Mobility management and wireless access
Performance evaluation of service execution in opportunistic computing
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Research challenges towards the Future Internet
Computer Communications
Modelling inter-contact times in social pervasive networks
Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Privacy-enhanced social-network routing
Computer Communications
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
Modelling social-aware forwarding in opportunistic networks
PERFORM'10 Proceedings of the 2010 IFIP WG 6.3/7.3 international conference on Performance Evaluation of Computer and Communication Systems: milestones and future challenges
Practical privacy-aware opportunistic networking
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
MicroCast: cooperative video streaming on smartphones
Proceedings of the 10th international conference on Mobile systems, applications, and services
A survey of context data distribution for mobile ubiquitous systems
ACM Computing Surveys (CSUR)
Social aspects to support opportunistic networks in an academic environment
ADHOC-NOW'12 Proceedings of the 11th international conference on Ad-hoc, Mobile, and Wireless Networks
Traffic management strategy for delay-tolerant networks
Journal of Network and Computer Applications
Predicting encounters in opportunistic networks
Proceedings of the 1st ACM workshop on High performance mobile opportunistic systems
Ego network models for Future Internet social networking environments
Computer Communications
Optimizing network performance and carbon offset through opportunistic reclustering
Concurrency and Computation: Practice & Experience
A contact-history based routing for publish-subscribe scheme in hierarchical opportunistic networks
ICPCA/SWS'12 Proceedings of the 2012 international conference on Pervasive Computing and the Networked World
On routing protocols using mobile social networks
International Journal of Wireless and Mobile Computing
Domain-epidemic spray and forward routing algorithm of opportunistic networks
International Journal of Information and Communication Technology
Hi-index | 0.00 |
Opportunistic networks, in which nodes opportunistically exploit any pair-wise contact to identify next hops towards the destination, are one of the most interesting technologies to support the pervasive networking vision. Opportunistic networks allow content sharing between mobile users without requiring any pre-existing Internet infrastructure, and tolerate partitions, long disconnections, and topology instability in general. In this paper we propose a context-aware framework for routing and forwarding in opportunistic networks. The framework is general, and able to host various flavors of context-aware routing. In this work we also present a particular protocol, HiBOp, which, by exploiting the framework, learns and represents through context information, the users' behavior and their social relations, and uses this knowledge to drive the forwarding process. The comparison of HiBOp with reference to alternative solutions shows that a context-aware approach based on users' social relations turns out to be a very efficient solution for forwarding in opportunistic networks. We show performance improvements over the reference solutions both in terms of resource utilization and in terms of user perceived QoS.